nufw [ -h ] [ -V ] [ -D ] [ -m ] [ -v[v...] ] [ -s ] [ -S ] [ -N ] [ -A debug_area ] [ -k keyfile ] [ -c certfile ] [ -a cafile ] [ -r crlfile ] [ -n nuauth_cert_dn ] [ -d address ] [ -p (remote) port ] [ -t timeout ] [ -T track_size ] [ -q NfQueue_num ] [ -L Nfqueue_length ] [ -C ] [ -M ]
This manual page documents the nufw command.
nufw is the minimalist server, designed to run on the gateway(s) of the network. nufw is designed to run in conjunction with nuauth, the authenticating server. nufw receives network packets from the local firewall (on Linux 2.4 and 2.6, this is set up with the help of '-j NFQUEUE' or '-j QUEUE' netfilter target), and synchronizes with a nuauth server to check packet is authorized to travel through the gateway.
The design of the NUFW package lets administrator filter network traffic per user, not only per IP. This means you can now deal with different permissions for user A and user B, even if they work at the same moment, on the same multiuser machine. In other words, this extends firewalling criteria to userID, at the network scale.
Original packaging and informations and help can be found from http://www.nufw.org/
- Issues usage details and exits.
- Issues version and exits.
- Run as a daemon. If started as a daemon, nufw logs message to syslog. If you don't specify this option, messages go to the console nufw is running on, both on STDOUT and STDERR. Unless you are debugging something, you should run nufw with this option.
- Mark packets with UserID. This requires the wvmark POM patch applied to netfilter, and is necessary for per user QoS or routing.
- Increases debug level. Multiple switches are accepted and each of them increases the debug level by one. Default debug level is 2, max is 10.
- -A debug_areas
Chooses debug_area. Default debug area is ALL. To select a subset add value from the following list:
- DEBUG_AREA_MAIN (1) main domain
- DEBUG_AREA_PACKET (2) packet domain
- DEBUG_AREA_USER (4) user domain
- DEBUG_AREA_GW (8) Gateway domain, interaction with nufw servers.
- DEBUG_AREA_AUTH (16) Authentication domain
- -k keyfile
- Use specified file as SSL (private) key file.
- -c certfile
- Use specified file as SSL (public) certificate file.
- -a cafile
- Use specified file as SSL certificate authority file.
- -r crlfile
- Use specified file as SSL certificate revocation list file. You will need to restart nufw if you modify this file. Since 2.2.19, nufw reloads this file dynamically when receiving a HUP signal.
- -n nuauth_dn
- Use specified string as the needed DN of nuauth. nufw will refuse to connect if the provided string does not match the DN of the certificate provided by nuauth. If you do not use this option, the DN of the nuauth certificate will be checked against the fully qualified domain name of the nuauth server, obtained from a reverse DNS lookup on nuauth IP address.
- Disable strict TLS checking of the certificate provided by nuauth.
- Force strict TLS checking of the certificate provided by nuauth. This is the default behavior of the daemon since 2.2.18.
- Suppress error if server FQDN does not match certificate CN.
- -d address
- Network address of the nuauth server.
- -p port
- Specifies TCP port to send data to when addressing the nuauth server. Nuauth server must be setup to listen on that port. Default value : 4128
- -t seconds
- Specifies timeout to forget packets not answered for by nuauth. Default value : 15 s.
- -T track_size
- Set maximum number of packets that can wait a decision in nufw. Default value : 1000.
- -q NfQueue number
- If Nufw was compiled with NfQueue support, Id of the NfQueue to use (default : 0).
- -L NfQueue length
- Specify the length of the nfnetlink queue used by nufw. This is the number of packets that the kernel will keep internally before dropping new coming packets.
- Listen to conntrack events (needed for connection expiration).
Only report event on marked connections to nuauth (implies -C and -m)
This is the way to do an efficient selection of events to be sent to nuauth but this REQUIRES a kernel with transmit_mark applied (should be ok for 2.6.18+) and the use of CONNMARK to propagate the initial mark across all the packets of the connection.
The nufw daemon is designed to deal with several signals : USR1, USR2, SYS, WINCH and POLL.
- Increases verbosity. The daemon then acts as if it had been launched with one supplementary '-v'.A line is also added to the system log to mention the signal event.
- Decreases verbosity. The daemon then acts as if it had been launched with one less '-v'. A line is also added to the system log to mention the signal event.
- Removes the Conntrack events thread. This gets the daemon to work as if the "-C" switch had not been set. This is useful on HA configurations, when one firewall gets passive, for instance.
- Starts the Conntrack events thread. This gets the daemon to work as if the "-C" switch had been set at startup. This is useful on HA configurations, when one firewall gets active, for instance.
- Logs an "audit" line, mentionning how many network datagrams were received and sent since daemon startup.
This manual page was written by Vincent Deffontaines
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 2 as published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts and no Back-Cover Texts.